Potentially vulnerable applications

All of the applications of third parties are to be updated and maintained safe with the possible fix given by the respective manufacturers.
Here below we indicate a list of the types of applications known to be vulnerable which are
progressively discovered and used by ill-intentioned people to deface or however provoke damages on the websites which are based on such applications.